The American Heritage Dictionary defines Risk in the following terms:
In commercial terms, Risk is anything that causes harm of any sort to a business, the staff within that business or other people and organisations that work with that business.
In this section, we look at risk, how to identify it and quantify it and then hopefully, how to take steps to prevent the risk.
Determining Risk
The first steps in any form of risk policy is to determine what risks
there are and then to come up with prevention or recovery techniques for
the identified risks.
There are two current mainstream methodologies for Data Security Risk
within an organisation in use today; they have many similarities but also
huge fundamental differences that are not always that clear on the
surface.
The tradition approach to security has always been something called the
CIA model.
This has nothing to do with the security agency of the same name,
though the naming was probably somewhat tongue-in-cheek in the
distant past. The CIA model says that the most important controls
to put on data are:
For any given piece of data or system, these three issues should
be examined, and relevant controls should be put in place to implement
security accordingly.
Some broad-minded security professionals today argue
that this goal-oriented approach to security is not always sensible
and relevant in the real world and does not allow risk planning,
security breach and prioritisation to be flexibly factored in.
These debates and differences of opinion have led to another approach
to planning which is called the Risk Assessment Method or Disaster
Recovery Method.
This new and very rarely taught method is still lagging behind the
comfortably easy to implement CIA model but represents a more
flexible approach to risk management. It starts by assuming the
worse and planning in minimising risks of the worst actually
happening. It follows Murphy's Law that if something can go wrong,
it almost certainly will. Though the CIA method can happily be used
to set a number of goals, on top of this the question "So what else
could go wrong" or "How important is this in the grand scheme of
things?" is factored in as well.
This Risk Assessment Method often incorporates something known as
"Time Based Security" where rather than assume your data is safe,
the time taken to spot a breach, fix it and correct for the breach
is taken into account. This is why it is sometimes known as the
Disaster Recovery Method since it is flexible enough to assume that
the worse will happen, and provide guidelines for fixing the mess.
The Risk Assessment Method is not at all new. Consider the example
of a traditional castle - It doesn't work on the CIA assumption that
you can actually stop someone getting in but instead works on the far
more flexible assumption of working out methods to slow someone down
if they do breach the defences The defences even takes into account that the
bad-guys may actually be inside and still has measures of protection
and escape given these possibilities.
Risk Procedures
Some interesting statistics came out of a Security Survey conducted
by the DTI in 2000. They interviewed 1000 companies and found the
following:
These figures indicate a few important things.
Any company that is serious about addressing risk must first accept that
there is some inherent risk present in their business operation and then
start to think about what they should do if the identified dangers ever
occur. This is a very simple statement
to make and on the face of it sounds rather naive, but even in these
days of heightened security awareness, most people would still rather take
the Ostrich Approach (*) to security and risk planning.
Once someone within an organisation does start to accept the risk and
start on the path of identifying it, the next problem may be knowing
when to stop! Paranoia is a side-product of becoming risk-aware and
in some ways isn't always helpful. Another "risk" of doing your own risk
assessment is that too much knowledge of the organisation often leads
to too many assumptions being made. There are a few ways of avoiding the
"blinkered" approach:
Protection
One of the nice things about identifying risk is that the means of
protecting against it tend to become fairly obvious. Most forms
risks will have multiple protection methods so it always pays to
research these things properly and again, take the advice of a
security specialist.
The most important protection method for Risk is the existence of
a Security Policy. when all the risks have been identified and
documented, a policy should be drawn up that explains:
One important thing to remember is that not all risks will be
preventable. where this is the case, there is no alternative but
to use the Disaster Recovery method. If you can't prevent a risk
then a means of minimising it, or effecting a speedy recovery should
it happen should be devised, documented and implemented.
In more simple terms, security is anything that protects or attempts
to minimise risk. This can range from physical things such as a highly
visible security guard to conceptual things such as a corporate
security architecture (the design of your network and all the security
mechanisms incorporated into it).
There are a number of different areas of security which often cross
over and get highly confused so this section will look at the four
main ones and attempt to explain what they actually do.
Physical Security
At first sight, physical security would seem to be a nice and simple
one to explain. This area covers everything from the people involved in
protecting tangible items to the various devices used in this protection.
Physical Security is not there to protect knowledge and data, it is there
to protect the things that hold the knowledge and data.
The most obvious area of physical security are the people involved in
protecting buildings, people and equipment. Security Guards are
often the front line of defence for a company and are involved with
keeping people out of buildings and also keeping staff from stealing
company property. Although many security guards are ex-police and some
are very highly trained and key to a business, they are generally
viewed as fairly unskilled staff and ironically are much overlooked in
a company's overall security plans. It is often suprising that companies
will pay Information Security hundreds of pounds a day and yet the
security guards will probably be on the minimum wage. It is all very
well spending hundreds of thousands protecting data but if a security
guard isn't being paid enough to do a good job protecting the systems
holding this data from theft this may be a very dangerous economy. It
is often worthwhile enlisting the help of your Security Guards in
doing your Risk Assessment.
The professional and more highly-skilled version of the security guard
is the Close Protection Operative (or more commonly, the bodyguard).
This is a very misunderstood profession since CPOs are usually depicted
as big beefy chaps with guns who stop people getting shot. Although this
is a big part of the profession, the other large and usually overlooked
aspect to this job is risk minimilasition - It is far better to put a lot
of work into not having a client put at risk than it is to have to do
something about it when the risk happens.
CPOs will generally come from a military background, and much of their
work is covert, or fairly secretive. There are a number of specialisms
in this profession such as:
Although it is unlikely you will come across CPOs in day-to-day business
they can be very useful as someone to give you a second opinion or a "sanity
check". They should be able to show a broad spectrum of experience and
hopefully a good deal of common sense as well. CPOs don't come cheap so
be careful who you employ, it is worth making sure they are members of
a well respected Bodyguard Association and also check up on what experience
they really have if you can.
The other area of physical security are the Security Devices that are
installed and hopefully used to protect an organisation. Some examples of
these are:
IT and Network Security
IT Security is the area of security that deals with protecting non
physical data within an organisation and Network Security is the area
of security that deals with protecting data that comes in to, out of
or travels across the organisation.
The boundaries of these two areas of security are often blurred and
in smaller organisations one person or department will be responsible
for both areas. These two areas are very specialist areas and how much
resource is put into it depends on the level of risk and value of the
data that the Risk Analysis exposes.
Because of the technical and specialised nature of these jobs, there
is a common risk that people doing them will be somewhat over specialised
and "blinkered". There are many cases where an organisation will have
amazingly good data security and absolutely no physical protection to
stop the systems of media storing that data being stolen. If you are
going to employ someone for this sort of job, look for a broad base of
experience and some common sense as opposed to someone with a string of
technical qualifications and very little practical experience, it will
almost certainly pay off in the long term even if they need to go on a
few more training courses.
Some areas of IT Security:
Some areas of Network Security:
Commercial Security
Commercial Security specialists are usually only found in larger organisations
and definitions of what these people do vary depending who you ask. To make
life easier, we will define a Commercial Security Specialist as:
A Security Specialist who has responsibility for all of the commercial
operations of a system, process or organisation. This includes:
It is the job of the Commercial Security Specialist to have a complete
and current overview of the area of their responsibility and as
such they will liaise with all of the security people mentioned in this
section and add a working knowledge of the business processes to achieve
this end. They need a broad area of skills, an equally broad area of
experience and importantly, good people skills, a lot of patience,
common sense and an odd imagination.
The Commercial Security Specialist will usually be the owner of the
Security Policy and the person responsible for keeping this up
to date and monitoring compliance with that policy.
Imagination is one of the key skills of a Risk Analyst
and 8-year-olds are brimming with it!
The security policy is a separate document from a Health and Safety
policy and from the Disaster Recovery policy.
What is Security?
Our American Heratige Dictionary defines Security as:
Risk Training Info. Email:
[email protected]
Copyright © 2002 Michael Lawrie. All rights reserved. For more information
on using these documents click here.